Security Operations and Incident Response

Postgraduate | 2026

Course page banner
area/catalogue icon
Area/Catalogue
INFO 5002
Course ID icon
Course ID
201705
Level of study
Level of study
Postgraduate
Unit value icon
Unit value
6
Course level icon
Course level
1
Study abroad and student exchange icon
Inbound study abroad and exchange
Inbound study abroad and exchange
The fee you pay will depend on the number and type of courses you study.
Yes
University-wide elective icon
University-wide elective course
Yes
Single course enrollment
Single course enrolment
Yes
alt
Note:
Course data is interim and subject to change

Course overview

This course aims to equip students with the skills and knowledge to effectively contribute to security operations and incident response teams. This course will cover the role and functions of a Security Operations Center (SOC), techniques for identifying, analysing, and assessing security threats and vulnerabilities, incident response strategies and procedures, security monitoring tools and technologies for threat detection and mitigation, and security automation and orchestration solutions. By the end of the course, students will obtain knowledge and skills to understand the role and functions of a SOC, identify and assess security threats and incidents, implement incident response strategies and procedures and develop proficiency in using tools and technologies for security monitoring and incident management.

Course learning outcomes

  • Explain the purpose, importance, responsibilities, roles, and key activities of Security Operations Centres (SOCs) in modern cyber security landscapes
  • Analyse security events and incidents to determine their severity and potential impact on organisational assets
  • Apply incident response methodologies and best practices to mitigate security breaches, minimise damage, recover from breaches and continuously improve an incident response process in a complex IT infrastructure
  • Utilise security tools, technologies, and threat intelligence effectively to monitor networks, detect threats, and respond to incidents in real-time

Prerequisite(s)

Corequisite(s)

N/A

Antirequisite(s)

N/A